fal-ai-image
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [Data Exfiltration] (CRITICAL): The
scripts/upload.shscript is designed to read local files and transmit their binary content to an external storage service (fal.ai). This capability, when exposed to an AI agent, creates a critical risk where sensitive files such as~/.ssh/id_rsa,~/.aws/credentials, or.envfiles can be exfiltrated through indirect prompt injection. - [Prompt Injection] (HIGH): The skill handles user prompts as direct inputs to shell scripts that execute network requests and write to the local file system. The absence of boundary markers or input sanitization allows an adversary to manipulate the agent's behavior and exploit the skill's capabilities for malicious purposes.
- [External Downloads] (MEDIUM): The
scripts/generate.shandscripts/edit.shtools download files from the internet usingcurl -obased on URLs provided by a third-party API. The lack of validation for the source or integrity of these downloads presents a risk if the external service is compromised or if the download path is manipulated. - [Command Execution] (MEDIUM): The
--output-dirargument is used directly inmkdir -pand as a target for file writes. Without strict validation, this allows for the creation of directories and placement of files in arbitrary locations on the host system, which could lead to resource exhaustion or unauthorized file organization.
Recommendations
- AI detected serious security threats
Audit Metadata